Kahoot review Flashcards

1
Q

NO Operation instructions that slide the program execution to the next memory address are known as

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__________ prevents senders from denying they sent the encrypted message.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A man in the middle attack, machine in the middle, monkey in the middle attack is when an _______________.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A hacker takes a device and hides malware within it hoping someone finds the device. This is best known as ____________.

A

Road apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ proves the contents of a message have not been changed since it was sent.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ sits behind a firewall, adding another layer of analysis, removing any risky content from the data flow.

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ will show you the number of lines from the bottom of a file.

A

Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it when any access to information is granted to someone who shouldn’t have access to it, such as credentials.

A

Sensitive Data Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This vulnerability has been around since iOS7. Those in Bluetooth range could reprogram your iPhone.

A

AirDrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______ happens when invalid data is sent to the application, intending to make it do something it shouldn’t.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP is a protocol that enables network communications and translates IPv$ addresses to IPv6 addresses.

true/false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The OG PING utility created in 1983, was used by DARPA to test performance and was called the packet internet groper.

true / false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Comparable to a classic firewall; has a choke point router filtering inbound traffic; before the web server and the firewall.

A

Retina

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ may make forecasting the address to where a program jumps undoable.

A

Stack randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ verifies the origin of the message.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Netcat functions as a back-end tool that allows data across a client and server once the connection is established.

true / false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which rootkit infects your hard drive or system BIOS and may even be used to intercept disk-written data?

A

Hardware or Firmware Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NDP supplements several IPv4

A

Host Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

There are four categories of IDS. What are they?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__________ is a device that monitors activity to identify questionable or even hostile events.

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NMap can do all but which of the following?

A

Transfer files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___________ will show you the first 3 lines of a file.

A

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Snort advantages include all of the following except:

A

It comes confgured for every 0 day attack out there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ICC contains information about the owner, including the PIN and the PKI digital certificates.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A worm strained up to 50 million computers in 2007. What was its name?

A

Storm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Every Snort rule must have a SID.

true/false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In this mode it reads packets off the network and displays them in a stream on your interface.

A

sniffer mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The algorithm a node uses to map an IPv6 destination address to a neighbor IPv6 address.

A

Next hop determination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is a PING command

A

-t PINGS the specified host until stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A shell script used to scan system binaries for rootkit alteration.

A

Chrootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Logs all packets to a disk, and can be useful for network traffic debugging.

A

Packet logger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Pings are mostly used when two hosts have no problem communicating with each other.

true / false

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An attack used for almost six years before it was found to be a common rootkit attack on Windows 10.

A

Zacinlo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Stateless firewalls use dynamic filtering.

true / false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The two types of DNS queries are iterative and recursive.

true / false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which is not NOP-sled?

A

Jump sled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An attacker compromises a legitimate website knowing a victim will browse and allow them to breach their target device.

A

Drive-by download

38
Q

Much like multi-byte sleds, its opcode can go straight to the shell code

A

Trampoline sleds

39
Q

PKI certificates verify all of the following but which

A

Message decryption

40
Q

Ports ___ to ____ are well known port numbers, designed for internet use.

A

0 to 1023

41
Q

Netcat is a ___________ utility which reads and writes data across network connection…

A

UNIX

42
Q

IPv6 vulnerabilities include all of which of the following

A

Bind TCP

43
Q

A common technique to get through a locked door; simply follow someone opening a door and enter before it closes

A

Tailgating

44
Q

Encryption provides the following: confidentiality, authentication integrity and non repidiotnstr

true / false

A

True

45
Q

Retina can scan

A

550 vulnerabilities

46
Q

________ is the amount of time it takes from the release of a new patch to its full adoption among a fleet of mobile devices.

A

Vunerability window

47
Q

All of the following are the modes of snort except:

A

HIPS (Host based intusion prevention system)

48
Q

Who creates digital certificates and owns the poicies for verifying recipeoents

A

Certfication authorities

49
Q

Which rootkit targets the core of your OS, changing how it functions?

A

Kernel mode rootkit

50
Q

A command-line port scanner for all Windows Platforms

A

ScanLine

51
Q

____ will return a certain word when parsing files

A

Grep

52
Q

The graphical user interface aids you in the development of network visual mappings for better usability

A

Zenmap

53
Q

The broad term used to cover a wide range of malicious activities accomplished through human interactions

A

social engineering

54
Q

what command will print a list of all commands available to you in netcat

A

nc -help

55
Q

DES, AES and Blowfish are all examples of what type of encryption.

A

Symmetric

56
Q

You can schedule a run PING command as a future task.

A

True

57
Q

__________ consists of 3 to 90 ros, each of which is like a small linear barcode

A

PDF417

58
Q

CACs contain only abbreviated, selected data. This data is encryped using ____ encruption.

A

2048 bit

59
Q

This cryptographic hash’s main purpose is to ensure that files have not been altered; does so by using checksum.

A

MD5

60
Q

__________ occurs when the volume of data exceeds the storage capacity of the memory buffer.

A

Buffer overflow

61
Q

Some of the msot common reasons for network latency include DNS server errors, poorly optimized servers and low memory

true/false

A

True

62
Q

This is a cyber attack

A

IP spoofing

63
Q

Slammer was _____________ bytes, about the length of a regular paragraph.

A

376

64
Q

Which one of the following don’t lie?

A

HIPS

65
Q

The direction operators <> and –> indicate the direction of interest for traffic.

true / false

A

true

66
Q

Which rootkit hides in your computer’s RAM?

A

Memory rootkit

67
Q

Cryptcat is much like Netcat with what exception?

A

It allows encryption via twofish

68
Q

This information may not be stored on a CAC

A

Personal medical information

69
Q

A site infected with adware, taking advantage of a vulnerability in a user’s web browser, delivers a

A

drive by download

70
Q

According to GA law, computer trespass is when an actor uses a computer to alter, destroy, damage or disrupt

true / false

A

true

71
Q

The S2 calls, your access will be revoked unless further clearance related information is given. This is an example of:

A

Pretexting

72
Q

Which rootkit replaces standard files in your computer, such as word or notepad?

A

application rootkit

73
Q

In a ____, shell code “fastens” itself to a socket on a port and listens to see if it can establish a connection.

A

port bind

74
Q

Snort rules can be written in a multi-line. This can be done by adding a backslash \ to the end of the line,

A

true

75
Q

The two types of DNS servers are?

A

Recursor & Root

76
Q

The size of an ICMP Echo request is ________.

A
77
Q

What do you not have to consider…

A

How expensive will the IPS be?

78
Q

This worm launched, and within 15 minutes, 27 million were without internet or cell service.

A

Slammer

79
Q

Ensuring guest and old accounts are removed and everything is up to date prevents ___________

A

Security misconfiguration

80
Q

Traffic will hit a border router, then a firewall, yet another firewall, and an inner router

A

Dual firewall setup

81
Q

_____________ encodes the message’s content

A

Confidentiality

82
Q

What are the types of port binding for ports that receive messages

A

Specify now, specify later & direct

83
Q

Snort supports all of the below IP protocols for suspicious behavior except for

A

ARP

84
Q

___________ allow parts of an encryption to happen in hardware rather than software.

A

The AES extensions

85
Q

How can you identify an ARP attack??

A

When two IP addresses share the same physical address

86
Q

A ___________ is a small piece of software that piggybacks on real programs.

A

virus

87
Q

Which encryption standard is the most common used, with a block size of 128 bits, can have 3 different key lengths

A

AES

88
Q

Attackers are not able to conceal their network location by using “decoy traffic”

A

false

89
Q

CAC keys are typically __ bits in length

A

256 bits

90
Q

This vantage point gives the highest visibility while it eliminates any traffic that occurs between hosts:

A

Right behind the firewall